Watch Dogs 2 has some pretty fun open world hack puzzles to solve for additional research points. This is one based in Palo Alto and how to solve it.
REUPLOAD: "Ding's" removed due to triggering ;)
http://www.twitch.tv/heelvsbabyface (LiveStreaming)
https://www.facebook.com/pages/Heel-vs-Babyface/439979786044998 (Facebook)
https://twitter.com/HeelvsBabyface (Twitter)
http://eu.battle.net/wow/en/character/thunderhorn/Azbats/simple (Armory)
https://www.youtube.com/channel/UCo4XlmOC4YXw7LqHMjDs7sQ (Title Sequence and Branding)

666 different ways to bypass palo alto networks in 6 minutes
full log file can be found http://goo.gl/WR3VkJ
full config file http://pastebin.com/PXARPh2a
what is proven in the video:
• Palo Alto Networks by using security shortcuts ,creates a big security risk for customers and dramatically increase probability of being breached
• The whole system configured by vendor recommended best practices was managed to be bypassed with more than 600 different ways
• This cannot be resolved by a patch or a signature as the single-pass architecture is fundamentally flawed

published:30 Nov 2015

views:20682

Demo shows exploits and malware used for ransomware and how Traps prevents them using a multi-method approach.
Disclaimer- While I amPalo Alto Networks employee, any opinions or statements are mine alone.

“SelfHacking to Wellness” - a presentation by Joe Cohen on August 18, 2016.
Each person is different with biological differences. It is important to find the root cause for ailments that an individual might have. Mr. Cohen refers to many mechanisms leading to poor health. These include an imbalanced microbiome, poor mitochondrial function, oxidative stress, inflammation, impaired methylation disorders, poor blood flow, and malfunctioning biological pathways. These are all interconnected with one leading to the other. Underlying all of these are oxidative stress and inflammation.
Risk factors increasing inflammation and oxidative stress include:
• Psychological stress,
• Marathons/Excess exercise,
• A vegan/vegetarian diet - which is lower in Vitamin A and other nutrition and higher in
lectins. Retinol is critical for immune tolerance and a high lectin load for a sustained
period will create chaos.
• Less sun exposure (UV and infrared are the best ways to shut the immune system down.
UVB also helps create vitamin D3, which is necessary for immune tolerance),
• Less consumption of DHA, which is critical for immune balance,
• Chronic circadian disruptions, which imbalances the gut immune system,
• Infections/Biotoxin exposure,
• Sleep deprivation, which will disturb your immune system.
• Antibiotics, which will disturb the gut flora...
• EMF exposure -
More details at
http://www.svhi.com/august-18-2016-meeting-joe-cohen-self-hacking-wellness/
Visit the Silicon ValleyHealthInstitute (aka SmartLifeForum) at
http://www.svhi.com
Silicon Valley Health Institute Smart Life Forum Palo Alto

published:15 Sep 2016

views:9607

Read more at BigThink.com:
FollowBigThink here:
YouTube: http://goo.gl/CPTsV5
Facebook: https://www.facebook.com/BigThinkdotcom
Twitter: https://twitter.com/bigthink
John Carreyrou:
I don’t think it’s just about greed. I don’t think the Theranos scandal was just about greed, and I don’t think Elizabeth Holmes’ only motive was greed.
I think, more than riches, what she was after was fame. She wanted to be in the pantheon of these billionaire tech founders and her idol, as I detail in the book, was Steve Jobs. I mean she absolutely idolized him and Apple.
So I mean in Silicon Valley—and really in American society at large—there’s this reverence for the entrepreneur and for the successful entrepreneur. And this reverence has morphed into almost like a cult of these young bright-eyed tech founders dropping out of (usually) Stanford and going on to found their businesses and getting a lot of funding and then becoming billionaires. And she was on that same track.
The problem is that on the way there she cut a lot of corners and crossed some bright red lines. The biggest one was that in the fall of 2013 she went live with her blood tests in Walgreens stores, first in Palo Alto and then in the Phoenix area. And very few of the tests on the menu were done with actual Theranos technology. Most of them, the vast majority, in fact, were done with third party analyzers bought from other companies. But then they also hacked those machines to “adapt” them to the small finger stick samples, because they wanted to maintain the illusion that they did have this innovative technology that could test, do the full range of tests from just a drop or two of blood pricked from a finger.
And in hacking these commercial machines they made the testing less accurate and less reliable. And so essentially they put lives at risk. That’s one big piece of it, and that’s part of the wrongdoing here.
But another part of it is that by going commercial and then soliciting funding from investors Elizabeth Holmes used the fact that her services were in Walgreen’s stores to get investors on board, because it was like the validation that “Yes, this product was for real. How could it not be? They’ve gone live with it. It’s commercial!”
But I would say that there were two stages of Theranos.
There was a stage when she had just dropped out with this vision, and people like Tim Draper and Don Lucas and Larry Ellison gave her money and funded her. And that was your typical early startup where chances are it’s not going to work out, because nine out of ten of these companies fail, and one succeeds, and maybe it becomes a great success.
And those are the odds, and the investors who invested in the first few rounds in 2005 and 2006 knew what those odds were, and they knew that they were taking a flyer and a young kid who seemed smart and dynamic and seemed to have a great vision.
Where Theranos became a fraud is much later, when in 2013 she launched the blood tests in Walgreens stores and then went back to investors to solicit more money. And that’s actually when Theranos raised the lion’s share of the nearly billion dollars that it raised over its 15 year history. More than $700 million of that billion dollars was raised after 2013, and it was based on the premise that Theranos had a groundbreaking product, and the “proof” was that the product was commercialized—it was in Walgreens stores.
So on the one hand you have putting patients in harm’s way with inaccurate blood tests, and on the other you have defrauding investors, essentially securities fraud.
And in this cult of the startup founder that we have (and of entrepreneurialism) we tend to forget that there’s also something called business ethics, and that these people, even if they have great ambitions and great visions they still need to play by the same rules that we all play by—by society’s rules.
And this cult of the startup founder and this reverence we have for entrepreneurialism shouldn’t excuse wrongdoing. It shouldn’t excuse committing white collar crimes. You’re always going to have people who can find ways to get around rules and laws. And so I hope that the Theranos scandal remains a lesson in people’s minds, in VCs’ minds, and entrepreneurs’ minds in Silicon Valley—that cutting too many corners and not obeying regulations in healthcare is not okay.

Palo Alto is cracking down on churches that are trying to offest costs by subletting their space. Kiet Do reports. (7-27-17)

published:28 Jul 2017

views:2614

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s SimoneDel Rosario had to take some special precautions – including leaving behind anything that could be hacked.
RT LIVEhttp://rt.com/on-air
Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday
Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT
Listen to us on Soundcloud: https://soundcloud.com/rttv
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

published:03 Aug 2016

views:21550

With cybersecurity back in the news, is it time to let Palo Alto out of the penalty box? Jim Cramer sat down to speak with the CEO about what's ahead.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC
» Watch more Mad Money here: http://bit.ly/WatchMadMoney
» Read more about Palo Alto here: http://cnb.cx/2fyOAFc
"Mad Money" takes viewers inside the mind of one of Wall Street's most respected and successful money managers. Jim Cramer is your personal guide through the confusing jungle of Wall Street investing, navigating through both opportunities and pitfalls with one goal in mind -- to try to help you make money.
About CNBC: From 'Wall Street' to 'Main Street' to award winning original documentaries and Reality TV series, CNBC has you covered. Experience special sneak peeks of your favorite shows, exclusive video and more.
Get More Mad Money!
Read the latest news: http://madmoney.cnbc.com
Watch full episodes: http://bit.ly/MadMoneyEpisodes
Follow Mad Money on Twitter: http://bit.ly/MadMoneyTwitter
Like Mad Money on Facebook: http://bit.ly/LikeMadMoney
Follow Cramer on Twitter: http://bit.ly/FollowCramer
Connect with CNBC NewsOnline!
Visit CNBC.com: http://www.cnbc.com/
Find CNBC News on Facebook: http://cnb.cx/LikeCNBC
Follow CNBC News on Twitter: http://cnb.cx/FollowCNBC
Follow CNBC News on Google+: http://cnb.cx/PlusCNBC
Follow CNBC News on Instagram: http://cnb.cx/InstagramCNBC
Palo Alto Networks CEO: Automating HackPrevention | Mad Money | CNBC

Other

Palo Alto (book)

Palo Alto is a collection of linked short stories by American actor and writer James Franco. The collection was published in 2010 by Scribner's. The stories are about teenagers and their experiments with vices and their struggles with their families. The book is named after his home town of Palo Alto, California, and is dedicated to many of the writers he worked with at Brooklyn College. Inspired by some of Franco's own teenage memories, and memories written and submitted by high school students at Palo Alto Senior High School, the stories describe life in Palo Alto as experienced by a series of teenagers who spend most of their time indulging in driving drunk, using drugs and taking part in unplanned acts of violence. Each passage is told by a young narrator.

Palo-Alto

Palo-Alto is an upland barangay and subdivision project located in Calamba, Laguna in the Philippines, south of Mayapa, west of Barandal, south-east of Majada Out, and north-east of Laguerta. It houses various residential areas such as the Pag-Ibig Project and Koalisyon Pabahay ng Pilipinas.

References

External links

Palo Alto (2007 film)

Palo Alto is a 2007 independent film that is set in Palo Alto, California and was made by Brad Leong, Tony Vallone, and Daniel Engelhardt, three filmmakers who are locals of that city. The plot centers on four college freshmen on their last night of Thanksgiving Break, their first time back since leaving for school. They find that the old adage about absence making the heart grow fonder rings true in director Brad Leong's nostalgic comedy drama.

Only then do they realize their small town, once seemingly boring and meaningless, has much more to offer than they ever expected.

Plot

Palo Alto is the story of four college freshman on their last night of Thanksgiving Break, their first time back since leaving for school. We follow them as they come to realize their small town, once seemingly boring and meaningless, has much more to offer then they ever expected.

The film opens with Alec, Nolan, Patrick and Ryan sneaking into an old classroom to retrieve an item confiscated by a freshman high school teacher. Their conversation is interrupted when campus security discovers them. The friends dart through the halls of the school and manage to avoid capture. Now in front of Palo Alto High, the friends say their goodbyes for the evening.

Palo Alto Networks

Palo Alto Networks, Inc. is a network and enterprise security company based in Santa Clara, California. The company’s core products are a platform that includes advanced firewalls designed to provide network security, visibility and granular control of network activity based on application, user, and content identification and cloud based offerings that extend those firewalls to cover other aspects of security. Palo Alto Networks competes against traditional firewall, IPS and IDS, and UTMvendors including Cisco, Fortinet, Cyberoam, Check Point, Juniper Networks and others.

History

Palo Alto Networks was founded in 2005 by Nir Zuk, a former engineer from Check Point and NetScreen Technologies. Zuk was the principal developer of the first stateful inspection firewall and the first intrusion prevention system. When asked why he started Palo Alto Networks, Zuk cited his objective of solving a problem enterprises were facing with existing network security solutions: the inability to safely enable employees to use modern applications, which entailed developing a firewall that could identify and provide fine-grained control of applications.

Watch Dogs 2: PALO ALTO Research Point Hack GUIDE !!

Watch Dogs 2 has some pretty fun open world hack puzzles to solve for additional research points. This is one based in Palo Alto and how to solve it.
REUPLOAD: "Ding's" removed due to triggering ;)
http://www.twitch.tv/heelvsbabyface (LiveStreaming)
https://www.facebook.com/pages/Heel-vs-Babyface/439979786044998 (Facebook)
https://twitter.com/HeelvsBabyface (Twitter)
http://eu.battle.net/wow/en/character/thunderhorn/Azbats/simple (Armory)
https://www.youtube.com/channel/UCo4XlmOC4YXw7LqHMjDs7sQ (Title Sequence and Branding)

666 different ways to bypass palo alto networks in 6 minutes

666 different ways to bypass palo alto networks in 6 minutes
full log file can be found http://goo.gl/WR3VkJ
full config file http://pastebin.com/PXARPh2a
what is proven in the video:
• Palo Alto Networks by using security shortcuts ,creates a big security risk for customers and dramatically increase probability of being breached
• The whole system configured by vendor recommended best practices was managed to be bypassed with more than 600 different ways
• This cannot be resolved by a patch or a signature as the single-pass architecture is fundamentally flawed

Demo shows exploits and malware used for ransomware and how Traps prevents them using a multi-method approach.
Disclaimer- While I amPalo Alto Networks employee, any opinions or statements are mine alone.

Self Hacking to Wellness - Joe Cohen (August 2016)

“SelfHacking to Wellness” - a presentation by Joe Cohen on August 18, 2016.
Each person is different with biological differences. It is important to find the root cause for ailments that an individual might have. Mr. Cohen refers to many mechanisms leading to poor health. These include an imbalanced microbiome, poor mitochondrial function, oxidative stress, inflammation, impaired methylation disorders, poor blood flow, and malfunctioning biological pathways. These are all interconnected with one leading to the other. Underlying all of these are oxidative stress and inflammation.
Risk factors increasing inflammation and oxidative stress include:
• Psychological stress,
• Marathons/Excess exercise,
• A vegan/vegetarian diet - which is lower in Vitamin A and other nutrition and higher in
lectins. Retinol is critical for immune tolerance and a high lectin load for a sustained
period will create chaos.
• Less sun exposure (UV and infrared are the best ways to shut the immune system down.
UVB also helps create vitamin D3, which is necessary for immune tolerance),
• Less consumption of DHA, which is critical for immune balance,
• Chronic circadian disruptions, which imbalances the gut immune system,
• Infections/Biotoxin exposure,
• Sleep deprivation, which will disturb your immune system.
• Antibiotics, which will disturb the gut flora...
• EMF exposure -
More details at
http://www.svhi.com/august-18-2016-meeting-joe-cohen-self-hacking-wellness/
Visit the Silicon ValleyHealthInstitute (aka SmartLifeForum) at
http://www.svhi.com
Silicon Valley Health Institute Smart Life Forum Palo Alto

5:38

How one company got $1 billion through secrecy, hacking, and fraud | John Carreyrou

How one company got $1 billion through secrecy, hacking, and fraud | John Carreyrou

How one company got $1 billion through secrecy, hacking, and fraud | John Carreyrou

Read more at BigThink.com:
FollowBigThink here:
YouTube: http://goo.gl/CPTsV5
Facebook: https://www.facebook.com/BigThinkdotcom
Twitter: https://twitter.com/bigthink
John Carreyrou:
I don’t think it’s just about greed. I don’t think the Theranos scandal was just about greed, and I don’t think Elizabeth Holmes’ only motive was greed.
I think, more than riches, what she was after was fame. She wanted to be in the pantheon of these billionaire tech founders and her idol, as I detail in the book, was Steve Jobs. I mean she absolutely idolized him and Apple.
So I mean in Silicon Valley—and really in American society at large—there’s this reverence for the entrepreneur and for the successful entrepreneur. And this reverence has morphed into almost like a cult of these young bright-eyed tech founders dropping out of (usually) Stanford and going on to found their businesses and getting a lot of funding and then becoming billionaires. And she was on that same track.
The problem is that on the way there she cut a lot of corners and crossed some bright red lines. The biggest one was that in the fall of 2013 she went live with her blood tests in Walgreens stores, first in Palo Alto and then in the Phoenix area. And very few of the tests on the menu were done with actual Theranos technology. Most of them, the vast majority, in fact, were done with third party analyzers bought from other companies. But then they also hacked those machines to “adapt” them to the small finger stick samples, because they wanted to maintain the illusion that they did have this innovative technology that could test, do the full range of tests from just a drop or two of blood pricked from a finger.
And in hacking these commercial machines they made the testing less accurate and less reliable. And so essentially they put lives at risk. That’s one big piece of it, and that’s part of the wrongdoing here.
But another part of it is that by going commercial and then soliciting funding from investors Elizabeth Holmes used the fact that her services were in Walgreen’s stores to get investors on board, because it was like the validation that “Yes, this product was for real. How could it not be? They’ve gone live with it. It’s commercial!”
But I would say that there were two stages of Theranos.
There was a stage when she had just dropped out with this vision, and people like Tim Draper and Don Lucas and Larry Ellison gave her money and funded her. And that was your typical early startup where chances are it’s not going to work out, because nine out of ten of these companies fail, and one succeeds, and maybe it becomes a great success.
And those are the odds, and the investors who invested in the first few rounds in 2005 and 2006 knew what those odds were, and they knew that they were taking a flyer and a young kid who seemed smart and dynamic and seemed to have a great vision.
Where Theranos became a fraud is much later, when in 2013 she launched the blood tests in Walgreens stores and then went back to investors to solicit more money. And that’s actually when Theranos raised the lion’s share of the nearly billion dollars that it raised over its 15 year history. More than $700 million of that billion dollars was raised after 2013, and it was based on the premise that Theranos had a groundbreaking product, and the “proof” was that the product was commercialized—it was in Walgreens stores.
So on the one hand you have putting patients in harm’s way with inaccurate blood tests, and on the other you have defrauding investors, essentially securities fraud.
And in this cult of the startup founder that we have (and of entrepreneurialism) we tend to forget that there’s also something called business ethics, and that these people, even if they have great ambitions and great visions they still need to play by the same rules that we all play by—by society’s rules.
And this cult of the startup founder and this reverence we have for entrepreneurialism shouldn’t excuse wrongdoing. It shouldn’t excuse committing white collar crimes. You’re always going to have people who can find ways to get around rules and laws. And so I hope that the Theranos scandal remains a lesson in people’s minds, in VCs’ minds, and entrepreneurs’ minds in Silicon Valley—that cutting too many corners and not obeying regulations in healthcare is not okay.

Palo Alto Cracks Down On Neighborhood Churches

Palo Alto is cracking down on churches that are trying to offest costs by subletting their space. Kiet Do reports. (7-27-17)

2:39

Getting ready for 'Black Hat' global hacker conference: leave all devices at home

Getting ready for 'Black Hat' global hacker conference: leave all devices at home

Getting ready for 'Black Hat' global hacker conference: leave all devices at home

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s SimoneDel Rosario had to take some special precautions – including leaving behind anything that could be hacked.
RT LIVEhttp://rt.com/on-air
Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday
Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT
Listen to us on Soundcloud: https://soundcloud.com/rttv
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

6:52

Palo Alto Networks CEO: Automating Hack Prevention | Mad Money | CNBC

Palo Alto Networks CEO: Automating Hack Prevention | Mad Money | CNBC

Palo Alto Networks CEO: Automating Hack Prevention | Mad Money | CNBC

With cybersecurity back in the news, is it time to let Palo Alto out of the penalty box? Jim Cramer sat down to speak with the CEO about what's ahead.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC
» Watch more Mad Money here: http://bit.ly/WatchMadMoney
» Read more about Palo Alto here: http://cnb.cx/2fyOAFc
"Mad Money" takes viewers inside the mind of one of Wall Street's most respected and successful money managers. Jim Cramer is your personal guide through the confusing jungle of Wall Street investing, navigating through both opportunities and pitfalls with one goal in mind -- to try to help you make money.
About CNBC: From 'Wall Street' to 'Main Street' to award winning original documentaries and Reality TV series, CNBC has you covered. Experience special sneak peeks of your favorite shows, exclusive video and more.
Get More Mad Money!
Read the latest news: http://madmoney.cnbc.com
Watch full episodes: http://bit.ly/MadMoneyEpisodes
Follow Mad Money on Twitter: http://bit.ly/MadMoneyTwitter
Like Mad Money on Facebook: http://bit.ly/LikeMadMoney
Follow Cramer on Twitter: http://bit.ly/FollowCramer
Connect with CNBC NewsOnline!
Visit CNBC.com: http://www.cnbc.com/
Find CNBC News on Facebook: http://cnb.cx/LikeCNBC
Follow CNBC News on Twitter: http://cnb.cx/FollowCNBC
Follow CNBC News on Google+: http://cnb.cx/PlusCNBC
Follow CNBC News on Instagram: http://cnb.cx/InstagramCNBC
Palo Alto Networks CEO: Automating HackPrevention | Mad Money | CNBC

52:23

Inside the Mind of a Hacker: Track Every Step of an Attack with Behavioral Analytics (1788)

Inside the Mind of a Hacker: Track Every Step of an Attack with Behavioral Analytics (1788)

Inside the Mind of a Hacker: Track Every Step of an Attack with Behavioral Analytics (1788)

Do you want to know how attackers operate? Most highly-motivated adversaries use well-known tools and tricks to carry out their attacks. Join Giora Engel, VP of Product Management at Palo Alto Networks, as he describes how attackers infiltrate networks, expand their realm of control, and locate and steal or destroy sensitive information.
With Magnifier Behavioral Analytics, organizations now have a powerful defense to shutdown advanced threats. During this session, Engel will describe attackers’ methods and reveal how Magnifier detects every stage in the post-intrusion attack lifecycle. He will explain how Magnifier interrogates suspicious endpoints to determine which process initiated an attack, analyzes the endpoint process using WildFire, and integrates with the Next-Generation Firewall to disrupt the attack before the damage is done.
Attend this session to learn:
The latest tactics, techniques, and procedures of malicious actors
A hacker’s step-by-step attack playbook
How to hunt down and eradicate advanced threats with Magnifier Behavioral Analytics, a cloud-based application for the Palo Alto Networks ApplicationFramework
Speakers
Tamar Shafler, Sr. Product Manager - Magnifier, Palo Alto Networks

15:00

Tutorial: Searching Through Logs: Where Do I Start?

Tutorial: Searching Through Logs: Where Do I Start?

Tutorial: Searching Through Logs: Where Do I Start?

Learn more on the LiveCommunity at http://bit.ly/2E2Id7x. It's important to log traffic flowing through the firewall, but it can become a daunting task to find the proverbial needle in the haystack. Log filters to the rescue.

Watch Dogs 2: PALO ALTO Research Point Hack GUIDE !!

Watch Dogs 2 has some pretty fun open world hack puzzles to solve for additional research points. This is one based in Palo Alto and how to solve it.
REUPLOAD: "Ding's" removed due to triggering ;)
http://www.twitch.tv/heelvsbabyface (LiveStreaming)
https://www.facebook.com/pages/Heel-vs-Babyface/439979786044998 (Facebook)
https://twitter.com/HeelvsBabyface (Twitter)
http://eu.battle.net/wow/en/character/thunderhorn/Azbats/simple (Armory)
https://www.youtube.com/channel/UCo4XlmOC4YXw7LqHMjDs7sQ (Title Sequence and Branding)

666 different ways to bypass palo alto networks in 6 minutes

666 different ways to bypass palo alto networks in 6 minutes
full log file can be found http://goo.gl/WR3VkJ
full config file http://pastebin.com/PXARPh2a
what is proven in the video:
• Palo Alto Networks by using security shortcuts ,creates a big security risk for customers and dramatically increase probability of being breached
• The whole system configured by vendor recommended best practices was managed to be bypassed with more than 600 different ways
• This cannot be resolved by a patch or a signature as the single-pass architecture is fundamentally flawed

Demo shows exploits and malware used for ransomware and how Traps prevents them using a multi-method approach.
Disclaimer- While I amPalo Alto Networks employee, any opinions or statements are mine alone.

Self Hacking to Wellness - Joe Cohen (August 2016)

“SelfHacking to Wellness” - a presentation by Joe Cohen on August 18, 2016.
Each person is different with biological differences. It is important to find the root cause for ailments that an individual might have. Mr. Cohen refers to many mechanisms leading to poor health. These include an imbalanced microbiome, poor mitochondrial function, oxidative stress, inflammation, impaired methylation disorders, poor blood flow, and malfunctioning biological pathways. These are all interconnected with one leading to the other. Underlying all of these are oxidative stress and inflammation.
Risk factors increasing inflammation and oxidative stress include:
• Psychological stress,
• Marathons/Excess exercise,
• A vegan/vegetarian diet - which is lower in Vitamin A and other nutrition and higher in
le...

published: 15 Sep 2016

How one company got $1 billion through secrecy, hacking, and fraud | John Carreyrou

Read more at BigThink.com:
FollowBigThink here:
YouTube: http://goo.gl/CPTsV5
Facebook: https://www.facebook.com/BigThinkdotcom
Twitter: https://twitter.com/bigthink
John Carreyrou:
I don’t think it’s just about greed. I don’t think the Theranos scandal was just about greed, and I don’t think Elizabeth Holmes’ only motive was greed.
I think, more than riches, what she was after was fame. She wanted to be in the pantheon of these billionaire tech founders and her idol, as I detail in the book, was Steve Jobs. I mean she absolutely idolized him and Apple.
So I mean in Silicon Valley—and really in American society at large—there’s this reverence for the entrepreneur and for the successful entrepreneur. And this reverence has morphed into almost like a cult of these young bright-eye...

Palo Alto Cracks Down On Neighborhood Churches

Palo Alto is cracking down on churches that are trying to offest costs by subletting their space. Kiet Do reports. (7-27-17)

published: 28 Jul 2017

Getting ready for 'Black Hat' global hacker conference: leave all devices at home

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s SimoneDel Rosario had to take some special precautions – including leaving behind anything that could be hacked.
RT LIVEhttp://rt.com/on-air
Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday
Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT
Listen to us on Soundcloud: https://soundcloud.com/rttv
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube v...

published: 03 Aug 2016

Palo Alto Networks CEO: Automating Hack Prevention | Mad Money | CNBC

With cybersecurity back in the news, is it time to let Palo Alto out of the penalty box? Jim Cramer sat down to speak with the CEO about what's ahead.
» Subscribe to CNBC: http://cnb.cx/SubscribeCNBC
» Watch more Mad Money here: http://bit.ly/WatchMadMoney
» Read more about Palo Alto here: http://cnb.cx/2fyOAFc
"Mad Money" takes viewers inside the mind of one of Wall Street's most respected and successful money managers. Jim Cramer is your personal guide through the confusing jungle of Wall Street investing, navigating through both opportunities and pitfalls with one goal in mind -- to try to help you make money.
About CNBC: From 'Wall Street' to 'Main Street' to award winning original documentaries and Reality TV series, CNBC has you covered. Experience special sneak peeks of your favor...

published: 28 Sep 2017

Inside the Mind of a Hacker: Track Every Step of an Attack with Behavioral Analytics (1788)

Do you want to know how attackers operate? Most highly-motivated adversaries use well-known tools and tricks to carry out their attacks. Join Giora Engel, VP of Product Management at Palo Alto Networks, as he describes how attackers infiltrate networks, expand their realm of control, and locate and steal or destroy sensitive information.
With Magnifier Behavioral Analytics, organizations now have a powerful defense to shutdown advanced threats. During this session, Engel will describe attackers’ methods and reveal how Magnifier detects every stage in the post-intrusion attack lifecycle. He will explain how Magnifier interrogates suspicious endpoints to determine which process initiated an attack, analyzes the endpoint process using WildFire, and integrates with the Next-Generation Firewall...

published: 05 Nov 2018

Tutorial: Searching Through Logs: Where Do I Start?

Learn more on the LiveCommunity at http://bit.ly/2E2Id7x. It's important to log traffic flowing through the firewall, but it can become a daunting task to find the proverbial needle in the haystack. Log filters to the rescue.

Watch Dogs 2: PALO ALTO Research Point Hack GUIDE !!

Watch Dogs 2 has some pretty fun open world hack puzzles to solve for additional research points. This is one based in Palo Alto and how to solve it.
REUPLOAD:...

Watch Dogs 2 has some pretty fun open world hack puzzles to solve for additional research points. This is one based in Palo Alto and how to solve it.
REUPLOAD: "Ding's" removed due to triggering ;)
http://www.twitch.tv/heelvsbabyface (LiveStreaming)
https://www.facebook.com/pages/Heel-vs-Babyface/439979786044998 (Facebook)
https://twitter.com/HeelvsBabyface (Twitter)
http://eu.battle.net/wow/en/character/thunderhorn/Azbats/simple (Armory)
https://www.youtube.com/channel/UCo4XlmOC4YXw7LqHMjDs7sQ (Title Sequence and Branding)

Watch Dogs 2 has some pretty fun open world hack puzzles to solve for additional research points. This is one based in Palo Alto and how to solve it.
REUPLOAD: "Ding's" removed due to triggering ;)
http://www.twitch.tv/heelvsbabyface (LiveStreaming)
https://www.facebook.com/pages/Heel-vs-Babyface/439979786044998 (Facebook)
https://twitter.com/HeelvsBabyface (Twitter)
http://eu.battle.net/wow/en/character/thunderhorn/Azbats/simple (Armory)
https://www.youtube.com/channel/UCo4XlmOC4YXw7LqHMjDs7sQ (Title Sequence and Branding)

666 different ways to bypass palo alto networks in 6 minutes

666 different ways to bypass palo alto networks in 6 minutes
full log file can be found http://goo.gl/WR3VkJ
full config file http://pastebin.com/PXARPh2a
wha...

666 different ways to bypass palo alto networks in 6 minutes
full log file can be found http://goo.gl/WR3VkJ
full config file http://pastebin.com/PXARPh2a
what is proven in the video:
• Palo Alto Networks by using security shortcuts ,creates a big security risk for customers and dramatically increase probability of being breached
• The whole system configured by vendor recommended best practices was managed to be bypassed with more than 600 different ways
• This cannot be resolved by a patch or a signature as the single-pass architecture is fundamentally flawed

666 different ways to bypass palo alto networks in 6 minutes
full log file can be found http://goo.gl/WR3VkJ
full config file http://pastebin.com/PXARPh2a
what is proven in the video:
• Palo Alto Networks by using security shortcuts ,creates a big security risk for customers and dramatically increase probability of being breached
• The whole system configured by vendor recommended best practices was managed to be bypassed with more than 600 different ways
• This cannot be resolved by a patch or a signature as the single-pass architecture is fundamentally flawed

Demo shows exploits and malware used for ransomware and how Traps prevents them using a multi-method approach.
Disclaimer- While I amPalo Alto Networks employee, any opinions or statements are mine alone.

Demo shows exploits and malware used for ransomware and how Traps prevents them using a multi-method approach.
Disclaimer- While I amPalo Alto Networks employee, any opinions or statements are mine alone.

Self Hacking to Wellness - Joe Cohen (August 2016)

“SelfHacking to Wellness” - a presentation by Joe Cohen on August 18, 2016.
Each person is different with biological differences. It is important to find the ...

“SelfHacking to Wellness” - a presentation by Joe Cohen on August 18, 2016.
Each person is different with biological differences. It is important to find the root cause for ailments that an individual might have. Mr. Cohen refers to many mechanisms leading to poor health. These include an imbalanced microbiome, poor mitochondrial function, oxidative stress, inflammation, impaired methylation disorders, poor blood flow, and malfunctioning biological pathways. These are all interconnected with one leading to the other. Underlying all of these are oxidative stress and inflammation.
Risk factors increasing inflammation and oxidative stress include:
• Psychological stress,
• Marathons/Excess exercise,
• A vegan/vegetarian diet - which is lower in Vitamin A and other nutrition and higher in
lectins. Retinol is critical for immune tolerance and a high lectin load for a sustained
period will create chaos.
• Less sun exposure (UV and infrared are the best ways to shut the immune system down.
UVB also helps create vitamin D3, which is necessary for immune tolerance),
• Less consumption of DHA, which is critical for immune balance,
• Chronic circadian disruptions, which imbalances the gut immune system,
• Infections/Biotoxin exposure,
• Sleep deprivation, which will disturb your immune system.
• Antibiotics, which will disturb the gut flora...
• EMF exposure -
More details at
http://www.svhi.com/august-18-2016-meeting-joe-cohen-self-hacking-wellness/
Visit the Silicon ValleyHealthInstitute (aka SmartLifeForum) at
http://www.svhi.com
Silicon Valley Health Institute Smart Life Forum Palo Alto

“SelfHacking to Wellness” - a presentation by Joe Cohen on August 18, 2016.
Each person is different with biological differences. It is important to find the root cause for ailments that an individual might have. Mr. Cohen refers to many mechanisms leading to poor health. These include an imbalanced microbiome, poor mitochondrial function, oxidative stress, inflammation, impaired methylation disorders, poor blood flow, and malfunctioning biological pathways. These are all interconnected with one leading to the other. Underlying all of these are oxidative stress and inflammation.
Risk factors increasing inflammation and oxidative stress include:
• Psychological stress,
• Marathons/Excess exercise,
• A vegan/vegetarian diet - which is lower in Vitamin A and other nutrition and higher in
lectins. Retinol is critical for immune tolerance and a high lectin load for a sustained
period will create chaos.
• Less sun exposure (UV and infrared are the best ways to shut the immune system down.
UVB also helps create vitamin D3, which is necessary for immune tolerance),
• Less consumption of DHA, which is critical for immune balance,
• Chronic circadian disruptions, which imbalances the gut immune system,
• Infections/Biotoxin exposure,
• Sleep deprivation, which will disturb your immune system.
• Antibiotics, which will disturb the gut flora...
• EMF exposure -
More details at
http://www.svhi.com/august-18-2016-meeting-joe-cohen-self-hacking-wellness/
Visit the Silicon ValleyHealthInstitute (aka SmartLifeForum) at
http://www.svhi.com
Silicon Valley Health Institute Smart Life Forum Palo Alto

Read more at BigThink.com:
FollowBigThink here:
YouTube: http://goo.gl/CPTsV5
Facebook: https://www.facebook.com/BigThinkdotcom
Twitter: https://twitter.com/bigthink
John Carreyrou:
I don’t think it’s just about greed. I don’t think the Theranos scandal was just about greed, and I don’t think Elizabeth Holmes’ only motive was greed.
I think, more than riches, what she was after was fame. She wanted to be in the pantheon of these billionaire tech founders and her idol, as I detail in the book, was Steve Jobs. I mean she absolutely idolized him and Apple.
So I mean in Silicon Valley—and really in American society at large—there’s this reverence for the entrepreneur and for the successful entrepreneur. And this reverence has morphed into almost like a cult of these young bright-eyed tech founders dropping out of (usually) Stanford and going on to found their businesses and getting a lot of funding and then becoming billionaires. And she was on that same track.
The problem is that on the way there she cut a lot of corners and crossed some bright red lines. The biggest one was that in the fall of 2013 she went live with her blood tests in Walgreens stores, first in Palo Alto and then in the Phoenix area. And very few of the tests on the menu were done with actual Theranos technology. Most of them, the vast majority, in fact, were done with third party analyzers bought from other companies. But then they also hacked those machines to “adapt” them to the small finger stick samples, because they wanted to maintain the illusion that they did have this innovative technology that could test, do the full range of tests from just a drop or two of blood pricked from a finger.
And in hacking these commercial machines they made the testing less accurate and less reliable. And so essentially they put lives at risk. That’s one big piece of it, and that’s part of the wrongdoing here.
But another part of it is that by going commercial and then soliciting funding from investors Elizabeth Holmes used the fact that her services were in Walgreen’s stores to get investors on board, because it was like the validation that “Yes, this product was for real. How could it not be? They’ve gone live with it. It’s commercial!”
But I would say that there were two stages of Theranos.
There was a stage when she had just dropped out with this vision, and people like Tim Draper and Don Lucas and Larry Ellison gave her money and funded her. And that was your typical early startup where chances are it’s not going to work out, because nine out of ten of these companies fail, and one succeeds, and maybe it becomes a great success.
And those are the odds, and the investors who invested in the first few rounds in 2005 and 2006 knew what those odds were, and they knew that they were taking a flyer and a young kid who seemed smart and dynamic and seemed to have a great vision.
Where Theranos became a fraud is much later, when in 2013 she launched the blood tests in Walgreens stores and then went back to investors to solicit more money. And that’s actually when Theranos raised the lion’s share of the nearly billion dollars that it raised over its 15 year history. More than $700 million of that billion dollars was raised after 2013, and it was based on the premise that Theranos had a groundbreaking product, and the “proof” was that the product was commercialized—it was in Walgreens stores.
So on the one hand you have putting patients in harm’s way with inaccurate blood tests, and on the other you have defrauding investors, essentially securities fraud.
And in this cult of the startup founder that we have (and of entrepreneurialism) we tend to forget that there’s also something called business ethics, and that these people, even if they have great ambitions and great visions they still need to play by the same rules that we all play by—by society’s rules.
And this cult of the startup founder and this reverence we have for entrepreneurialism shouldn’t excuse wrongdoing. It shouldn’t excuse committing white collar crimes. You’re always going to have people who can find ways to get around rules and laws. And so I hope that the Theranos scandal remains a lesson in people’s minds, in VCs’ minds, and entrepreneurs’ minds in Silicon Valley—that cutting too many corners and not obeying regulations in healthcare is not okay.

Read more at BigThink.com:
FollowBigThink here:
YouTube: http://goo.gl/CPTsV5
Facebook: https://www.facebook.com/BigThinkdotcom
Twitter: https://twitter.com/bigthink
John Carreyrou:
I don’t think it’s just about greed. I don’t think the Theranos scandal was just about greed, and I don’t think Elizabeth Holmes’ only motive was greed.
I think, more than riches, what she was after was fame. She wanted to be in the pantheon of these billionaire tech founders and her idol, as I detail in the book, was Steve Jobs. I mean she absolutely idolized him and Apple.
So I mean in Silicon Valley—and really in American society at large—there’s this reverence for the entrepreneur and for the successful entrepreneur. And this reverence has morphed into almost like a cult of these young bright-eyed tech founders dropping out of (usually) Stanford and going on to found their businesses and getting a lot of funding and then becoming billionaires. And she was on that same track.
The problem is that on the way there she cut a lot of corners and crossed some bright red lines. The biggest one was that in the fall of 2013 she went live with her blood tests in Walgreens stores, first in Palo Alto and then in the Phoenix area. And very few of the tests on the menu were done with actual Theranos technology. Most of them, the vast majority, in fact, were done with third party analyzers bought from other companies. But then they also hacked those machines to “adapt” them to the small finger stick samples, because they wanted to maintain the illusion that they did have this innovative technology that could test, do the full range of tests from just a drop or two of blood pricked from a finger.
And in hacking these commercial machines they made the testing less accurate and less reliable. And so essentially they put lives at risk. That’s one big piece of it, and that’s part of the wrongdoing here.
But another part of it is that by going commercial and then soliciting funding from investors Elizabeth Holmes used the fact that her services were in Walgreen’s stores to get investors on board, because it was like the validation that “Yes, this product was for real. How could it not be? They’ve gone live with it. It’s commercial!”
But I would say that there were two stages of Theranos.
There was a stage when she had just dropped out with this vision, and people like Tim Draper and Don Lucas and Larry Ellison gave her money and funded her. And that was your typical early startup where chances are it’s not going to work out, because nine out of ten of these companies fail, and one succeeds, and maybe it becomes a great success.
And those are the odds, and the investors who invested in the first few rounds in 2005 and 2006 knew what those odds were, and they knew that they were taking a flyer and a young kid who seemed smart and dynamic and seemed to have a great vision.
Where Theranos became a fraud is much later, when in 2013 she launched the blood tests in Walgreens stores and then went back to investors to solicit more money. And that’s actually when Theranos raised the lion’s share of the nearly billion dollars that it raised over its 15 year history. More than $700 million of that billion dollars was raised after 2013, and it was based on the premise that Theranos had a groundbreaking product, and the “proof” was that the product was commercialized—it was in Walgreens stores.
So on the one hand you have putting patients in harm’s way with inaccurate blood tests, and on the other you have defrauding investors, essentially securities fraud.
And in this cult of the startup founder that we have (and of entrepreneurialism) we tend to forget that there’s also something called business ethics, and that these people, even if they have great ambitions and great visions they still need to play by the same rules that we all play by—by society’s rules.
And this cult of the startup founder and this reverence we have for entrepreneurialism shouldn’t excuse wrongdoing. It shouldn’t excuse committing white collar crimes. You’re always going to have people who can find ways to get around rules and laws. And so I hope that the Theranos scandal remains a lesson in people’s minds, in VCs’ minds, and entrepreneurs’ minds in Silicon Valley—that cutting too many corners and not obeying regulations in healthcare is not okay.

Getting ready for 'Black Hat' global hacker conference: leave all devices at home

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT ...

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s SimoneDel Rosario had to take some special precautions – including leaving behind anything that could be hacked.
RT LIVEhttp://rt.com/on-air
Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday
Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT
Listen to us on Soundcloud: https://soundcloud.com/rttv
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s SimoneDel Rosario had to take some special precautions – including leaving behind anything that could be hacked.
RT LIVEhttp://rt.com/on-air
Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday
Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT
Listen to us on Soundcloud: https://soundcloud.com/rttv
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

Inside the Mind of a Hacker: Track Every Step of an Attack with Behavioral Analytics (1788)

Do you want to know how attackers operate? Most highly-motivated adversaries use well-known tools and tricks to carry out their attacks. Join Giora Engel, VP of...

Do you want to know how attackers operate? Most highly-motivated adversaries use well-known tools and tricks to carry out their attacks. Join Giora Engel, VP of Product Management at Palo Alto Networks, as he describes how attackers infiltrate networks, expand their realm of control, and locate and steal or destroy sensitive information.
With Magnifier Behavioral Analytics, organizations now have a powerful defense to shutdown advanced threats. During this session, Engel will describe attackers’ methods and reveal how Magnifier detects every stage in the post-intrusion attack lifecycle. He will explain how Magnifier interrogates suspicious endpoints to determine which process initiated an attack, analyzes the endpoint process using WildFire, and integrates with the Next-Generation Firewall to disrupt the attack before the damage is done.
Attend this session to learn:
The latest tactics, techniques, and procedures of malicious actors
A hacker’s step-by-step attack playbook
How to hunt down and eradicate advanced threats with Magnifier Behavioral Analytics, a cloud-based application for the Palo Alto Networks ApplicationFramework
Speakers
Tamar Shafler, Sr. Product Manager - Magnifier, Palo Alto Networks

Do you want to know how attackers operate? Most highly-motivated adversaries use well-known tools and tricks to carry out their attacks. Join Giora Engel, VP of Product Management at Palo Alto Networks, as he describes how attackers infiltrate networks, expand their realm of control, and locate and steal or destroy sensitive information.
With Magnifier Behavioral Analytics, organizations now have a powerful defense to shutdown advanced threats. During this session, Engel will describe attackers’ methods and reveal how Magnifier detects every stage in the post-intrusion attack lifecycle. He will explain how Magnifier interrogates suspicious endpoints to determine which process initiated an attack, analyzes the endpoint process using WildFire, and integrates with the Next-Generation Firewall to disrupt the attack before the damage is done.
Attend this session to learn:
The latest tactics, techniques, and procedures of malicious actors
A hacker’s step-by-step attack playbook
How to hunt down and eradicate advanced threats with Magnifier Behavioral Analytics, a cloud-based application for the Palo Alto Networks ApplicationFramework
Speakers
Tamar Shafler, Sr. Product Manager - Magnifier, Palo Alto Networks

Tutorial: Searching Through Logs: Where Do I Start?

Learn more on the LiveCommunity at http://bit.ly/2E2Id7x. It's important to log traffic flowing through the firewall, but it can become a daunting task to find...

Learn more on the LiveCommunity at http://bit.ly/2E2Id7x. It's important to log traffic flowing through the firewall, but it can become a daunting task to find the proverbial needle in the haystack. Log filters to the rescue.

Learn more on the LiveCommunity at http://bit.ly/2E2Id7x. It's important to log traffic flowing through the firewall, but it can become a daunting task to find the proverbial needle in the haystack. Log filters to the rescue.

Watch Dogs 2: PALO ALTO Research Point Hack GUIDE !!

Watch Dogs 2 has some pretty fun open world hack puzzles to solve for additional research points. This is one based in Palo Alto and how to solve it.
REUPLOAD: "Ding's" removed due to triggering ;)
http://www.twitch.tv/heelvsbabyface (LiveStreaming)
https://www.facebook.com/pages/Heel-vs-Babyface/439979786044998 (Facebook)
https://twitter.com/HeelvsBabyface (Twitter)
http://eu.battle.net/wow/en/character/thunderhorn/Azbats/simple (Armory)
https://www.youtube.com/channel/UCo4XlmOC4YXw7LqHMjDs7sQ (Title Sequence and Branding)

666 different ways to bypass palo alto networks in 6 minutes

666 different ways to bypass palo alto networks in 6 minutes
full log file can be found http://goo.gl/WR3VkJ
full config file http://pastebin.com/PXARPh2a
what is proven in the video:
• Palo Alto Networks by using security shortcuts ,creates a big security risk for customers and dramatically increase probability of being breached
• The whole system configured by vendor recommended best practices was managed to be bypassed with more than 600 different ways
• This cannot be resolved by a patch or a signature as the single-pass architecture is fundamentally flawed

Demo shows exploits and malware used for ransomware and how Traps prevents them using a multi-method approach.
Disclaimer- While I amPalo Alto Networks employee, any opinions or statements are mine alone.

Self Hacking to Wellness - Joe Cohen (August 2016)

“SelfHacking to Wellness” - a presentation by Joe Cohen on August 18, 2016.
Each person is different with biological differences. It is important to find the root cause for ailments that an individual might have. Mr. Cohen refers to many mechanisms leading to poor health. These include an imbalanced microbiome, poor mitochondrial function, oxidative stress, inflammation, impaired methylation disorders, poor blood flow, and malfunctioning biological pathways. These are all interconnected with one leading to the other. Underlying all of these are oxidative stress and inflammation.
Risk factors increasing inflammation and oxidative stress include:
• Psychological stress,
• Marathons/Excess exercise,
• A vegan/vegetarian diet - which is lower in Vitamin A and other nutrition and higher in
lectins. Retinol is critical for immune tolerance and a high lectin load for a sustained
period will create chaos.
• Less sun exposure (UV and infrared are the best ways to shut the immune system down.
UVB also helps create vitamin D3, which is necessary for immune tolerance),
• Less consumption of DHA, which is critical for immune balance,
• Chronic circadian disruptions, which imbalances the gut immune system,
• Infections/Biotoxin exposure,
• Sleep deprivation, which will disturb your immune system.
• Antibiotics, which will disturb the gut flora...
• EMF exposure -
More details at
http://www.svhi.com/august-18-2016-meeting-joe-cohen-self-hacking-wellness/
Visit the Silicon ValleyHealthInstitute (aka SmartLifeForum) at
http://www.svhi.com
Silicon Valley Health Institute Smart Life Forum Palo Alto

How one company got $1 billion through secrecy, hacking, and fraud | John Carreyrou

Read more at BigThink.com:
FollowBigThink here:
YouTube: http://goo.gl/CPTsV5
Facebook: https://www.facebook.com/BigThinkdotcom
Twitter: https://twitter.com/bigthink
John Carreyrou:
I don’t think it’s just about greed. I don’t think the Theranos scandal was just about greed, and I don’t think Elizabeth Holmes’ only motive was greed.
I think, more than riches, what she was after was fame. She wanted to be in the pantheon of these billionaire tech founders and her idol, as I detail in the book, was Steve Jobs. I mean she absolutely idolized him and Apple.
So I mean in Silicon Valley—and really in American society at large—there’s this reverence for the entrepreneur and for the successful entrepreneur. And this reverence has morphed into almost like a cult of these young bright-eyed tech founders dropping out of (usually) Stanford and going on to found their businesses and getting a lot of funding and then becoming billionaires. And she was on that same track.
The problem is that on the way there she cut a lot of corners and crossed some bright red lines. The biggest one was that in the fall of 2013 she went live with her blood tests in Walgreens stores, first in Palo Alto and then in the Phoenix area. And very few of the tests on the menu were done with actual Theranos technology. Most of them, the vast majority, in fact, were done with third party analyzers bought from other companies. But then they also hacked those machines to “adapt” them to the small finger stick samples, because they wanted to maintain the illusion that they did have this innovative technology that could test, do the full range of tests from just a drop or two of blood pricked from a finger.
And in hacking these commercial machines they made the testing less accurate and less reliable. And so essentially they put lives at risk. That’s one big piece of it, and that’s part of the wrongdoing here.
But another part of it is that by going commercial and then soliciting funding from investors Elizabeth Holmes used the fact that her services were in Walgreen’s stores to get investors on board, because it was like the validation that “Yes, this product was for real. How could it not be? They’ve gone live with it. It’s commercial!”
But I would say that there were two stages of Theranos.
There was a stage when she had just dropped out with this vision, and people like Tim Draper and Don Lucas and Larry Ellison gave her money and funded her. And that was your typical early startup where chances are it’s not going to work out, because nine out of ten of these companies fail, and one succeeds, and maybe it becomes a great success.
And those are the odds, and the investors who invested in the first few rounds in 2005 and 2006 knew what those odds were, and they knew that they were taking a flyer and a young kid who seemed smart and dynamic and seemed to have a great vision.
Where Theranos became a fraud is much later, when in 2013 she launched the blood tests in Walgreens stores and then went back to investors to solicit more money. And that’s actually when Theranos raised the lion’s share of the nearly billion dollars that it raised over its 15 year history. More than $700 million of that billion dollars was raised after 2013, and it was based on the premise that Theranos had a groundbreaking product, and the “proof” was that the product was commercialized—it was in Walgreens stores.
So on the one hand you have putting patients in harm’s way with inaccurate blood tests, and on the other you have defrauding investors, essentially securities fraud.
And in this cult of the startup founder that we have (and of entrepreneurialism) we tend to forget that there’s also something called business ethics, and that these people, even if they have great ambitions and great visions they still need to play by the same rules that we all play by—by society’s rules.
And this cult of the startup founder and this reverence we have for entrepreneurialism shouldn’t excuse wrongdoing. It shouldn’t excuse committing white collar crimes. You’re always going to have people who can find ways to get around rules and laws. And so I hope that the Theranos scandal remains a lesson in people’s minds, in VCs’ minds, and entrepreneurs’ minds in Silicon Valley—that cutting too many corners and not obeying regulations in healthcare is not okay.

Getting ready for 'Black Hat' global hacker conference: leave all devices at home

Some of the highest profile hackers and cyber-security specialists have converged on Las Vegas for the Black Hat hacker conference. To report from Sin City, RT America’s SimoneDel Rosario had to take some special precautions – including leaving behind anything that could be hacked.
RT LIVEhttp://rt.com/on-air
Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday
Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT
Listen to us on Soundcloud: https://soundcloud.com/rttv
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

Inside the Mind of a Hacker: Track Every Step of an Attack with Behavioral Analytics (1788)

Do you want to know how attackers operate? Most highly-motivated adversaries use well-known tools and tricks to carry out their attacks. Join Giora Engel, VP of Product Management at Palo Alto Networks, as he describes how attackers infiltrate networks, expand their realm of control, and locate and steal or destroy sensitive information.
With Magnifier Behavioral Analytics, organizations now have a powerful defense to shutdown advanced threats. During this session, Engel will describe attackers’ methods and reveal how Magnifier detects every stage in the post-intrusion attack lifecycle. He will explain how Magnifier interrogates suspicious endpoints to determine which process initiated an attack, analyzes the endpoint process using WildFire, and integrates with the Next-Generation Firewall to disrupt the attack before the damage is done.
Attend this session to learn:
The latest tactics, techniques, and procedures of malicious actors
A hacker’s step-by-step attack playbook
How to hunt down and eradicate advanced threats with Magnifier Behavioral Analytics, a cloud-based application for the Palo Alto Networks ApplicationFramework
Speakers
Tamar Shafler, Sr. Product Manager - Magnifier, Palo Alto Networks

Tutorial: Searching Through Logs: Where Do I Start?

Learn more on the LiveCommunity at http://bit.ly/2E2Id7x. It's important to log traffic flowing through the firewall, but it can become a daunting task to find the proverbial needle in the haystack. Log filters to the rescue.

Getting ready for 'Black Hat' global hacker confer...

Palo Alto Networks CEO: Automating Hack Prevention...

Inside the Mind of a Hacker: Track Every Step of a...

Tutorial: Searching Through Logs: Where Do I Start...

Palo Alto

In a city of the futureIt is difficult to concentrateMeet the boss, meet the wifeEverybody's happyEveryone is made for lifeIn a city of the futureIt is difficult to find a spaceI'm too busy to see youYou're too busy to waitBut I'm okay, how are you?Thanks for asking, thanks for askingBut I'm okay, how are you?I hope you're okay tooEveryone one of those daysWhen the sky's California blueWith a beautiful bombshellI throw myself into my workI'm too lazy, I've been kidding myself for so longI'm okay, how are you?Thanks for asking, thanks for askingBut I'm okay, how are you?